| ISBN | 出版时间 | 包装 | 开本 | 页数 | 字数 |
|---|---|---|---|---|---|
| 未知 | 暂无 | 暂无 | 未知 | 0 | 暂无 |
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
Private Information Retrieval Using Trusted Hardware
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components
License Transfer in OMA-DRM
Enhanced Security Architecture for Music Distribution on Mobile
A Formal Model of Access Control for Mobile Interactive Devices
Discretionary Capability Confinement
Minimal Threshold Closure
Reducing the Dependence of SPKI/SDSI on PKI
Delegation in Role-Based Access Control
Applying a Security Requirements Engineering Process
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
A Formal Framework for Confidentiality-Preserving Refinement
Timing-Sensitive Information Flow Analysis for Synchronous Systems
HBAC: A Model for History-Based Access Control and Its Model Checking
From Coupling Relations to Mated Invariants for Checking Information Flow
A Linear Logic of Authorization and Knowledge
Pret a Voter with Re-encryption Mixes
Secure Key-Updating for Lazy Revocation
Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
Deriving Secrecy in Key Establishment Protocols
……
Author Index